pulumi-vault 5.21.0a1709368526__py3-none-any.whl → 5.21.0a1710888431__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_vault/ad/get_access_credentials.py +4 -2
- pulumi_vault/ad/secret_backend.py +6 -2
- pulumi_vault/ad/secret_library.py +6 -2
- pulumi_vault/ad/secret_role.py +6 -2
- pulumi_vault/alicloud/auth_backend_role.py +6 -2
- pulumi_vault/approle/auth_backend_login.py +4 -0
- pulumi_vault/approle/auth_backend_role.py +6 -2
- pulumi_vault/approle/auth_backend_role_secret_id.py +4 -0
- pulumi_vault/approle/get_auth_backend_role_id.py +4 -0
- pulumi_vault/audit.py +14 -2
- pulumi_vault/audit_request_header.py +4 -0
- pulumi_vault/auth_backend.py +2 -2
- pulumi_vault/aws/auth_backend_cert.py +6 -2
- pulumi_vault/aws/auth_backend_client.py +6 -2
- pulumi_vault/aws/auth_backend_config_identity.py +6 -2
- pulumi_vault/aws/auth_backend_identity_whitelist.py +6 -2
- pulumi_vault/aws/auth_backend_role.py +6 -2
- pulumi_vault/aws/auth_backend_roletag_blacklist.py +4 -0
- pulumi_vault/aws/auth_backend_sts_role.py +6 -2
- pulumi_vault/aws/get_access_credentials.py +4 -2
- pulumi_vault/aws/secret_backend.py +2 -2
- pulumi_vault/aws/secret_backend_role.py +6 -2
- pulumi_vault/aws/secret_backend_static_role.py +10 -4
- pulumi_vault/azure/auth_backend_config.py +6 -2
- pulumi_vault/azure/auth_backend_role.py +6 -2
- pulumi_vault/azure/backend.py +12 -0
- pulumi_vault/azure/backend_role.py +4 -0
- pulumi_vault/azure/get_access_credentials.py +6 -0
- pulumi_vault/cert_auth_backend_role.py +4 -0
- pulumi_vault/consul/secret_backend.py +14 -2
- pulumi_vault/consul/secret_backend_role.py +8 -2
- pulumi_vault/database/secret_backend_connection.py +6 -2
- pulumi_vault/database/secret_backend_role.py +6 -2
- pulumi_vault/database/secret_backend_static_role.py +6 -2
- pulumi_vault/database/secrets_mount.py +6 -2
- pulumi_vault/egp_policy.py +4 -0
- pulumi_vault/gcp/auth_backend.py +6 -2
- pulumi_vault/gcp/auth_backend_role.py +6 -2
- pulumi_vault/gcp/get_auth_backend_role.py +4 -0
- pulumi_vault/gcp/secret_backend.py +4 -0
- pulumi_vault/gcp/secret_impersonated_account.py +6 -2
- pulumi_vault/gcp/secret_roleset.py +6 -2
- pulumi_vault/gcp/secret_static_account.py +6 -2
- pulumi_vault/generic/endpoint.py +6 -0
- pulumi_vault/generic/get_secret.py +6 -6
- pulumi_vault/generic/secret.py +2 -2
- pulumi_vault/get_auth_backend.py +4 -0
- pulumi_vault/get_auth_backends.py +22 -2
- pulumi_vault/get_nomad_access_token.py +4 -0
- pulumi_vault/get_policy_document.py +4 -0
- pulumi_vault/get_raft_autopilot_state.py +4 -0
- pulumi_vault/github/auth_backend.py +6 -2
- pulumi_vault/github/team.py +6 -2
- pulumi_vault/github/user.py +6 -2
- pulumi_vault/identity/entity.py +6 -2
- pulumi_vault/identity/entity_alias.py +6 -2
- pulumi_vault/identity/entity_policies.py +12 -0
- pulumi_vault/identity/get_entity.py +6 -0
- pulumi_vault/identity/get_group.py +6 -0
- pulumi_vault/identity/get_oidc_client_creds.py +4 -0
- pulumi_vault/identity/get_oidc_openid_config.py +4 -0
- pulumi_vault/identity/get_oidc_public_keys.py +4 -0
- pulumi_vault/identity/group.py +20 -2
- pulumi_vault/identity/group_alias.py +6 -2
- pulumi_vault/identity/group_member_entity_ids.py +12 -0
- pulumi_vault/identity/group_member_group_ids.py +12 -0
- pulumi_vault/identity/group_policies.py +12 -0
- pulumi_vault/identity/mfa_duo.py +6 -2
- pulumi_vault/identity/mfa_login_enforcement.py +6 -2
- pulumi_vault/identity/mfa_okta.py +6 -2
- pulumi_vault/identity/mfa_pingid.py +6 -2
- pulumi_vault/identity/mfa_totp.py +6 -2
- pulumi_vault/identity/oidc.py +4 -0
- pulumi_vault/identity/oidc_assignment.py +6 -2
- pulumi_vault/identity/oidc_client.py +6 -2
- pulumi_vault/identity/oidc_key.py +6 -2
- pulumi_vault/identity/oidc_key_allowed_client_id.py +4 -0
- pulumi_vault/identity/oidc_provider.py +6 -2
- pulumi_vault/identity/oidc_role.py +10 -2
- pulumi_vault/identity/oidc_scope.py +6 -2
- pulumi_vault/jwt/auth_backend.py +18 -6
- pulumi_vault/jwt/auth_backend_role.py +10 -2
- pulumi_vault/kmip/secret_backend.py +6 -2
- pulumi_vault/kmip/secret_role.py +6 -2
- pulumi_vault/kmip/secret_scope.py +6 -2
- pulumi_vault/kubernetes/auth_backend_config.py +6 -2
- pulumi_vault/kubernetes/auth_backend_role.py +6 -2
- pulumi_vault/kubernetes/get_service_account_token.py +4 -0
- pulumi_vault/kubernetes/secret_backend.py +6 -2
- pulumi_vault/kubernetes/secret_backend_role.py +14 -2
- pulumi_vault/kv/get_secret.py +6 -0
- pulumi_vault/kv/get_secret_subkeys_v2.py +6 -0
- pulumi_vault/kv/get_secret_v2.py +2 -6
- pulumi_vault/kv/get_secrets_list.py +6 -0
- pulumi_vault/kv/get_secrets_list_v2.py +6 -0
- pulumi_vault/kv/secret.py +8 -2
- pulumi_vault/kv/secret_backend_v2.py +12 -4
- pulumi_vault/kv/secret_v2.py +8 -2
- pulumi_vault/ldap/auth_backend.py +6 -2
- pulumi_vault/ldap/auth_backend_group.py +6 -2
- pulumi_vault/ldap/auth_backend_user.py +6 -2
- pulumi_vault/ldap/secret_backend.py +6 -2
- pulumi_vault/ldap/secret_backend_dynamic_role.py +10 -4
- pulumi_vault/ldap/secret_backend_library_set.py +6 -2
- pulumi_vault/ldap/secret_backend_static_role.py +10 -4
- pulumi_vault/managed/keys.py +2 -14
- pulumi_vault/mfa_duo.py +6 -2
- pulumi_vault/mfa_okta.py +6 -2
- pulumi_vault/mfa_pingid.py +6 -2
- pulumi_vault/mfa_totp.py +6 -2
- pulumi_vault/mongodbatlas/secret_backend.py +6 -2
- pulumi_vault/mongodbatlas/secret_role.py +10 -4
- pulumi_vault/mount.py +18 -2
- pulumi_vault/namespace.py +42 -62
- pulumi_vault/nomad_secret_backend.py +6 -2
- pulumi_vault/nomad_secret_role.py +6 -2
- pulumi_vault/okta/auth_backend.py +6 -2
- pulumi_vault/okta/auth_backend_group.py +6 -2
- pulumi_vault/okta/auth_backend_user.py +6 -2
- pulumi_vault/password_policy.py +6 -2
- pulumi_vault/pkisecret/get_backend_issuer.py +4 -2
- pulumi_vault/pkisecret/get_backend_issuers.py +4 -0
- pulumi_vault/pkisecret/get_backend_key.py +4 -0
- pulumi_vault/pkisecret/get_backend_keys.py +4 -0
- pulumi_vault/pkisecret/secret_backend_cert.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_ca.py +4 -0
- pulumi_vault/pkisecret/secret_backend_config_issuers.py +6 -2
- pulumi_vault/pkisecret/secret_backend_config_urls.py +12 -4
- pulumi_vault/pkisecret/secret_backend_crl_config.py +4 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +4 -0
- pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +4 -0
- pulumi_vault/pkisecret/secret_backend_issuer.py +6 -2
- pulumi_vault/pkisecret/secret_backend_key.py +2 -2
- pulumi_vault/pkisecret/secret_backend_role.py +6 -2
- pulumi_vault/pkisecret/secret_backend_root_cert.py +4 -0
- pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +6 -0
- pulumi_vault/pkisecret/secret_backend_sign.py +6 -0
- pulumi_vault/policy.py +2 -2
- pulumi_vault/quota_lease_count.py +6 -2
- pulumi_vault/quota_rate_limit.py +6 -2
- pulumi_vault/rabbitmq/secret_backend.py +6 -2
- pulumi_vault/rabbitmq/secret_backend_role.py +6 -2
- pulumi_vault/raft_autopilot.py +6 -2
- pulumi_vault/raft_snapshot_agent_config.py +111 -16
- pulumi_vault/rgp_policy.py +4 -0
- pulumi_vault/saml/auth_backend.py +6 -2
- pulumi_vault/saml/auth_backend_role.py +6 -2
- pulumi_vault/secrets/sync_association.py +4 -0
- pulumi_vault/secrets/sync_aws_destination.py +6 -2
- pulumi_vault/secrets/sync_azure_destination.py +6 -2
- pulumi_vault/secrets/sync_config.py +6 -2
- pulumi_vault/secrets/sync_gcp_destination.py +6 -2
- pulumi_vault/secrets/sync_gh_destination.py +6 -2
- pulumi_vault/secrets/sync_vercel_destination.py +6 -2
- pulumi_vault/ssh/_inputs.py +4 -0
- pulumi_vault/ssh/outputs.py +4 -0
- pulumi_vault/ssh/secret_backend_ca.py +6 -2
- pulumi_vault/ssh/secret_backend_role.py +6 -2
- pulumi_vault/terraformcloud/secret_backend.py +6 -2
- pulumi_vault/terraformcloud/secret_creds.py +4 -0
- pulumi_vault/terraformcloud/secret_role.py +6 -2
- pulumi_vault/token.py +6 -2
- pulumi_vault/tokenauth/auth_backend_role.py +6 -2
- pulumi_vault/transform/alphabet.py +4 -0
- pulumi_vault/transform/get_decode.py +4 -0
- pulumi_vault/transform/get_encode.py +4 -0
- pulumi_vault/transform/role.py +4 -0
- pulumi_vault/transform/template.py +4 -0
- pulumi_vault/transit/get_decrypt.py +4 -0
- pulumi_vault/transit/secret_backend_key.py +8 -2
- pulumi_vault/transit/secret_cache_config.py +4 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/METADATA +1 -1
- pulumi_vault-5.21.0a1710888431.dist-info/RECORD +244 -0
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/WHEEL +1 -1
- pulumi_vault-5.21.0a1709368526.dist-info/RECORD +0 -244
- {pulumi_vault-5.21.0a1709368526.dist-info → pulumi_vault-5.21.0a1710888431.dist-info}/top_level.txt +0 -0
@@ -661,6 +661,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
661
661
|
|
662
662
|
## Example Usage
|
663
663
|
|
664
|
+
<!--Start PulumiCodeChooser -->
|
664
665
|
```python
|
665
666
|
import pulumi
|
666
667
|
import pulumi_vault as vault
|
@@ -679,13 +680,14 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
679
680
|
],
|
680
681
|
audience="vault")
|
681
682
|
```
|
683
|
+
<!--End PulumiCodeChooser -->
|
682
684
|
|
683
685
|
## Import
|
684
686
|
|
685
687
|
Kubernetes auth backend role can be imported using the `path`, e.g.
|
686
688
|
|
687
689
|
```sh
|
688
|
-
|
690
|
+
$ pulumi import vault:kubernetes/authBackendRole:AuthBackendRole foo auth/kubernetes/role/foo
|
689
691
|
```
|
690
692
|
|
691
693
|
:param str resource_name: The name of the resource.
|
@@ -744,6 +746,7 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
744
746
|
|
745
747
|
## Example Usage
|
746
748
|
|
749
|
+
<!--Start PulumiCodeChooser -->
|
747
750
|
```python
|
748
751
|
import pulumi
|
749
752
|
import pulumi_vault as vault
|
@@ -762,13 +765,14 @@ class AuthBackendRole(pulumi.CustomResource):
|
|
762
765
|
],
|
763
766
|
audience="vault")
|
764
767
|
```
|
768
|
+
<!--End PulumiCodeChooser -->
|
765
769
|
|
766
770
|
## Import
|
767
771
|
|
768
772
|
Kubernetes auth backend role can be imported using the `path`, e.g.
|
769
773
|
|
770
774
|
```sh
|
771
|
-
|
775
|
+
$ pulumi import vault:kubernetes/authBackendRole:AuthBackendRole foo auth/kubernetes/role/foo
|
772
776
|
```
|
773
777
|
|
774
778
|
:param str resource_name: The name of the resource.
|
@@ -180,6 +180,7 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
180
180
|
"""
|
181
181
|
## Example Usage
|
182
182
|
|
183
|
+
<!--Start PulumiCodeChooser -->
|
183
184
|
```python
|
184
185
|
import pulumi
|
185
186
|
import pulumi_vault as vault
|
@@ -211,6 +212,7 @@ def get_service_account_token(backend: Optional[str] = None,
|
|
211
212
|
cluster_role_binding=False,
|
212
213
|
ttl="1h")
|
213
214
|
```
|
215
|
+
<!--End PulumiCodeChooser -->
|
214
216
|
|
215
217
|
|
216
218
|
:param str backend: The Kubernetes secret backend to generate service account
|
@@ -265,6 +267,7 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
265
267
|
"""
|
266
268
|
## Example Usage
|
267
269
|
|
270
|
+
<!--Start PulumiCodeChooser -->
|
268
271
|
```python
|
269
272
|
import pulumi
|
270
273
|
import pulumi_vault as vault
|
@@ -296,6 +299,7 @@ def get_service_account_token_output(backend: Optional[pulumi.Input[str]] = None
|
|
296
299
|
cluster_role_binding=False,
|
297
300
|
ttl="1h")
|
298
301
|
```
|
302
|
+
<!--End PulumiCodeChooser -->
|
299
303
|
|
300
304
|
|
301
305
|
:param str backend: The Kubernetes secret backend to generate service account
|
@@ -623,6 +623,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
623
623
|
"""
|
624
624
|
## Example Usage
|
625
625
|
|
626
|
+
<!--Start PulumiCodeChooser -->
|
626
627
|
```python
|
627
628
|
import pulumi
|
628
629
|
import pulumi_vault as vault
|
@@ -637,13 +638,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
637
638
|
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
638
639
|
disable_local_ca_jwt=False)
|
639
640
|
```
|
641
|
+
<!--End PulumiCodeChooser -->
|
640
642
|
|
641
643
|
## Import
|
642
644
|
|
643
645
|
The Kubernetes secret backend can be imported using its `path` e.g.
|
644
646
|
|
645
647
|
```sh
|
646
|
-
|
648
|
+
$ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes
|
647
649
|
```
|
648
650
|
|
649
651
|
:param str resource_name: The name of the resource.
|
@@ -685,6 +687,7 @@ class SecretBackend(pulumi.CustomResource):
|
|
685
687
|
"""
|
686
688
|
## Example Usage
|
687
689
|
|
690
|
+
<!--Start PulumiCodeChooser -->
|
688
691
|
```python
|
689
692
|
import pulumi
|
690
693
|
import pulumi_vault as vault
|
@@ -699,13 +702,14 @@ class SecretBackend(pulumi.CustomResource):
|
|
699
702
|
service_account_jwt=(lambda path: open(path).read())("/path/to/token"),
|
700
703
|
disable_local_ca_jwt=False)
|
701
704
|
```
|
705
|
+
<!--End PulumiCodeChooser -->
|
702
706
|
|
703
707
|
## Import
|
704
708
|
|
705
709
|
The Kubernetes secret backend can be imported using its `path` e.g.
|
706
710
|
|
707
711
|
```sh
|
708
|
-
|
712
|
+
$ pulumi import vault:kubernetes/secretBackend:SecretBackend config kubernetes
|
709
713
|
```
|
710
714
|
|
711
715
|
:param str resource_name: The name of the resource.
|
@@ -541,6 +541,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
541
541
|
|
542
542
|
Example using `service_account_name` mode:
|
543
543
|
|
544
|
+
<!--Start PulumiCodeChooser -->
|
544
545
|
```python
|
545
546
|
import pulumi
|
546
547
|
import pulumi_vault as vault
|
@@ -567,9 +568,11 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
567
568
|
"location": "earth",
|
568
569
|
})
|
569
570
|
```
|
571
|
+
<!--End PulumiCodeChooser -->
|
570
572
|
|
571
573
|
Example using `kubernetes_role_name` mode:
|
572
574
|
|
575
|
+
<!--Start PulumiCodeChooser -->
|
573
576
|
```python
|
574
577
|
import pulumi
|
575
578
|
import pulumi_vault as vault
|
@@ -596,9 +599,11 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
596
599
|
"location": "earth",
|
597
600
|
})
|
598
601
|
```
|
602
|
+
<!--End PulumiCodeChooser -->
|
599
603
|
|
600
604
|
Example using `generated_role_rules` mode:
|
601
605
|
|
606
|
+
<!--Start PulumiCodeChooser -->
|
602
607
|
```python
|
603
608
|
import pulumi
|
604
609
|
import pulumi_vault as vault
|
@@ -630,12 +635,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
630
635
|
"location": "earth",
|
631
636
|
})
|
632
637
|
```
|
638
|
+
<!--End PulumiCodeChooser -->
|
633
639
|
|
634
640
|
## Import
|
635
641
|
|
636
642
|
The Kubernetes secret backend role can be imported using the full path to the role
|
637
643
|
|
638
|
-
|
644
|
+
of the form: `<backend_path>/roles/<role_name>` e.g.
|
639
645
|
|
640
646
|
```sh
|
641
647
|
$ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
|
@@ -687,6 +693,7 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
687
693
|
|
688
694
|
Example using `service_account_name` mode:
|
689
695
|
|
696
|
+
<!--Start PulumiCodeChooser -->
|
690
697
|
```python
|
691
698
|
import pulumi
|
692
699
|
import pulumi_vault as vault
|
@@ -713,9 +720,11 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
713
720
|
"location": "earth",
|
714
721
|
})
|
715
722
|
```
|
723
|
+
<!--End PulumiCodeChooser -->
|
716
724
|
|
717
725
|
Example using `kubernetes_role_name` mode:
|
718
726
|
|
727
|
+
<!--Start PulumiCodeChooser -->
|
719
728
|
```python
|
720
729
|
import pulumi
|
721
730
|
import pulumi_vault as vault
|
@@ -742,9 +751,11 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
742
751
|
"location": "earth",
|
743
752
|
})
|
744
753
|
```
|
754
|
+
<!--End PulumiCodeChooser -->
|
745
755
|
|
746
756
|
Example using `generated_role_rules` mode:
|
747
757
|
|
758
|
+
<!--Start PulumiCodeChooser -->
|
748
759
|
```python
|
749
760
|
import pulumi
|
750
761
|
import pulumi_vault as vault
|
@@ -776,12 +787,13 @@ class SecretBackendRole(pulumi.CustomResource):
|
|
776
787
|
"location": "earth",
|
777
788
|
})
|
778
789
|
```
|
790
|
+
<!--End PulumiCodeChooser -->
|
779
791
|
|
780
792
|
## Import
|
781
793
|
|
782
794
|
The Kubernetes secret backend role can be imported using the full path to the role
|
783
795
|
|
784
|
-
|
796
|
+
of the form: `<backend_path>/roles/<role_name>` e.g.
|
785
797
|
|
786
798
|
```sh
|
787
799
|
$ pulumi import vault:kubernetes/secretBackendRole:SecretBackendRole example kubernetes kubernetes/roles/example-role
|
pulumi_vault/kv/get_secret.py
CHANGED
@@ -134,6 +134,7 @@ def get_secret(namespace: Optional[str] = None,
|
|
134
134
|
"""
|
135
135
|
## Example Usage
|
136
136
|
|
137
|
+
<!--Start PulumiCodeChooser -->
|
137
138
|
```python
|
138
139
|
import pulumi
|
139
140
|
import json
|
@@ -154,6 +155,8 @@ def get_secret(namespace: Optional[str] = None,
|
|
154
155
|
}))
|
155
156
|
secret_data = vault.kv.get_secret_output(path=secret.path)
|
156
157
|
```
|
158
|
+
<!--End PulumiCodeChooser -->
|
159
|
+
|
157
160
|
## Required Vault Capabilities
|
158
161
|
|
159
162
|
Use of this resource requires the `read` capability on the given path.
|
@@ -189,6 +192,7 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
189
192
|
"""
|
190
193
|
## Example Usage
|
191
194
|
|
195
|
+
<!--Start PulumiCodeChooser -->
|
192
196
|
```python
|
193
197
|
import pulumi
|
194
198
|
import json
|
@@ -209,6 +213,8 @@ def get_secret_output(namespace: Optional[pulumi.Input[Optional[str]]] = None,
|
|
209
213
|
}))
|
210
214
|
secret_data = vault.kv.get_secret_output(path=secret.path)
|
211
215
|
```
|
216
|
+
<!--End PulumiCodeChooser -->
|
217
|
+
|
212
218
|
## Required Vault Capabilities
|
213
219
|
|
214
220
|
Use of this resource requires the `read` capability on the given path.
|
@@ -134,6 +134,7 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
134
134
|
"""
|
135
135
|
## Example Usage
|
136
136
|
|
137
|
+
<!--Start PulumiCodeChooser -->
|
137
138
|
```python
|
138
139
|
import pulumi
|
139
140
|
import json
|
@@ -155,6 +156,8 @@ def get_secret_subkeys_v2(depth: Optional[int] = None,
|
|
155
156
|
test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
|
156
157
|
name=aws_secret.name)
|
157
158
|
```
|
159
|
+
<!--End PulumiCodeChooser -->
|
160
|
+
|
158
161
|
## Required Vault Capabilities
|
159
162
|
|
160
163
|
Use of this resource requires the `read` capability on the given path.
|
@@ -207,6 +210,7 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
207
210
|
"""
|
208
211
|
## Example Usage
|
209
212
|
|
213
|
+
<!--Start PulumiCodeChooser -->
|
210
214
|
```python
|
211
215
|
import pulumi
|
212
216
|
import json
|
@@ -228,6 +232,8 @@ def get_secret_subkeys_v2_output(depth: Optional[pulumi.Input[Optional[int]]] =
|
|
228
232
|
test = vault.kv.get_secret_subkeys_v2_output(mount=kvv2.path,
|
229
233
|
name=aws_secret.name)
|
230
234
|
```
|
235
|
+
<!--End PulumiCodeChooser -->
|
236
|
+
|
231
237
|
## Required Vault Capabilities
|
232
238
|
|
233
239
|
Use of this resource requires the `read` capability on the given path.
|
pulumi_vault/kv/get_secret_v2.py
CHANGED
@@ -174,9 +174,7 @@ def get_secret_v2(mount: Optional[str] = None,
|
|
174
174
|
version: Optional[int] = None,
|
175
175
|
opts: Optional[pulumi.InvokeOptions] = None) -> AwaitableGetSecretV2Result:
|
176
176
|
"""
|
177
|
-
##
|
178
|
-
|
179
|
-
Use of this resource requires the `read` capability on the given path.
|
177
|
+
## Example Usage
|
180
178
|
|
181
179
|
|
182
180
|
:param str mount: Path where KV-V2 engine is mounted.
|
@@ -220,9 +218,7 @@ def get_secret_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
220
218
|
version: Optional[pulumi.Input[Optional[int]]] = None,
|
221
219
|
opts: Optional[pulumi.InvokeOptions] = None) -> pulumi.Output[GetSecretV2Result]:
|
222
220
|
"""
|
223
|
-
##
|
224
|
-
|
225
|
-
Use of this resource requires the `read` capability on the given path.
|
221
|
+
## Example Usage
|
226
222
|
|
227
223
|
|
228
224
|
:param str mount: Path where KV-V2 engine is mounted.
|
@@ -80,6 +80,7 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
80
80
|
"""
|
81
81
|
## Example Usage
|
82
82
|
|
83
|
+
<!--Start PulumiCodeChooser -->
|
83
84
|
```python
|
84
85
|
import pulumi
|
85
86
|
import json
|
@@ -104,6 +105,8 @@ def get_secrets_list(namespace: Optional[str] = None,
|
|
104
105
|
}))
|
105
106
|
secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
|
106
107
|
```
|
108
|
+
<!--End PulumiCodeChooser -->
|
109
|
+
|
107
110
|
## Required Vault Capabilities
|
108
111
|
|
109
112
|
Use of this resource requires the `read` capability on the given path.
|
@@ -135,6 +138,7 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
135
138
|
"""
|
136
139
|
## Example Usage
|
137
140
|
|
141
|
+
<!--Start PulumiCodeChooser -->
|
138
142
|
```python
|
139
143
|
import pulumi
|
140
144
|
import json
|
@@ -159,6 +163,8 @@ def get_secrets_list_output(namespace: Optional[pulumi.Input[Optional[str]]] = N
|
|
159
163
|
}))
|
160
164
|
secrets = vault.kv.get_secrets_list_output(path=kvv1.path)
|
161
165
|
```
|
166
|
+
<!--End PulumiCodeChooser -->
|
167
|
+
|
162
168
|
## Required Vault Capabilities
|
163
169
|
|
164
170
|
Use of this resource requires the `read` capability on the given path.
|
@@ -102,6 +102,7 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
102
102
|
"""
|
103
103
|
## Example Usage
|
104
104
|
|
105
|
+
<!--Start PulumiCodeChooser -->
|
105
106
|
```python
|
106
107
|
import pulumi
|
107
108
|
import json
|
@@ -133,6 +134,8 @@ def get_secrets_list_v2(mount: Optional[str] = None,
|
|
133
134
|
nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
|
134
135
|
name=vault_kv_secret_v2["test_2"]["name"]))
|
135
136
|
```
|
137
|
+
<!--End PulumiCodeChooser -->
|
138
|
+
|
136
139
|
## Required Vault Capabilities
|
137
140
|
|
138
141
|
Use of this resource requires the `read` capability on the given path.
|
@@ -172,6 +175,7 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
172
175
|
"""
|
173
176
|
## Example Usage
|
174
177
|
|
178
|
+
<!--Start PulumiCodeChooser -->
|
175
179
|
```python
|
176
180
|
import pulumi
|
177
181
|
import json
|
@@ -203,6 +207,8 @@ def get_secrets_list_v2_output(mount: Optional[pulumi.Input[str]] = None,
|
|
203
207
|
nested_secrets = kvv2.path.apply(lambda path: vault.kv.get_secrets_list_v2_output(mount=path,
|
204
208
|
name=vault_kv_secret_v2["test_2"]["name"]))
|
205
209
|
```
|
210
|
+
<!--End PulumiCodeChooser -->
|
211
|
+
|
206
212
|
## Required Vault Capabilities
|
207
213
|
|
208
214
|
Use of this resource requires the `read` capability on the given path.
|
pulumi_vault/kv/secret.py
CHANGED
@@ -176,6 +176,7 @@ class Secret(pulumi.CustomResource):
|
|
176
176
|
|
177
177
|
## Example Usage
|
178
178
|
|
179
|
+
<!--Start PulumiCodeChooser -->
|
179
180
|
```python
|
180
181
|
import pulumi
|
181
182
|
import json
|
@@ -195,6 +196,8 @@ class Secret(pulumi.CustomResource):
|
|
195
196
|
"foo": "bar",
|
196
197
|
}))
|
197
198
|
```
|
199
|
+
<!--End PulumiCodeChooser -->
|
200
|
+
|
198
201
|
## Required Vault Capabilities
|
199
202
|
|
200
203
|
Use of this resource requires the `create` or `update` capability
|
@@ -207,7 +210,7 @@ class Secret(pulumi.CustomResource):
|
|
207
210
|
KV-V1 secrets can be imported using the `path`, e.g.
|
208
211
|
|
209
212
|
```sh
|
210
|
-
|
213
|
+
$ pulumi import vault:kv/secret:Secret secret kvv1/secret
|
211
214
|
```
|
212
215
|
|
213
216
|
:param str resource_name: The name of the resource.
|
@@ -234,6 +237,7 @@ class Secret(pulumi.CustomResource):
|
|
234
237
|
|
235
238
|
## Example Usage
|
236
239
|
|
240
|
+
<!--Start PulumiCodeChooser -->
|
237
241
|
```python
|
238
242
|
import pulumi
|
239
243
|
import json
|
@@ -253,6 +257,8 @@ class Secret(pulumi.CustomResource):
|
|
253
257
|
"foo": "bar",
|
254
258
|
}))
|
255
259
|
```
|
260
|
+
<!--End PulumiCodeChooser -->
|
261
|
+
|
256
262
|
## Required Vault Capabilities
|
257
263
|
|
258
264
|
Use of this resource requires the `create` or `update` capability
|
@@ -265,7 +271,7 @@ class Secret(pulumi.CustomResource):
|
|
265
271
|
KV-V1 secrets can be imported using the `path`, e.g.
|
266
272
|
|
267
273
|
```sh
|
268
|
-
|
274
|
+
$ pulumi import vault:kv/secret:Secret secret kvv1/secret
|
269
275
|
```
|
270
276
|
|
271
277
|
:param str resource_name: The name of the resource.
|
@@ -226,6 +226,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
226
226
|
|
227
227
|
## Example Usage
|
228
228
|
|
229
|
+
<!--Start PulumiCodeChooser -->
|
229
230
|
```python
|
230
231
|
import pulumi
|
231
232
|
import pulumi_vault as vault
|
@@ -243,6 +244,8 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
243
244
|
delete_version_after=12600,
|
244
245
|
cas_required=True)
|
245
246
|
```
|
247
|
+
<!--End PulumiCodeChooser -->
|
248
|
+
|
246
249
|
## Required Vault Capabilities
|
247
250
|
|
248
251
|
Use of this resource requires the `create` or `update` capability
|
@@ -252,10 +255,11 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
252
255
|
|
253
256
|
## Import
|
254
257
|
|
255
|
-
The KV-V2 secret backend can be imported using its unique ID,
|
258
|
+
The KV-V2 secret backend can be imported using its unique ID,
|
259
|
+
the `${mount}/config`, e.g.
|
256
260
|
|
257
261
|
```sh
|
258
|
-
|
262
|
+
$ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
|
259
263
|
```
|
260
264
|
|
261
265
|
:param str resource_name: The name of the resource.
|
@@ -286,6 +290,7 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
286
290
|
|
287
291
|
## Example Usage
|
288
292
|
|
293
|
+
<!--Start PulumiCodeChooser -->
|
289
294
|
```python
|
290
295
|
import pulumi
|
291
296
|
import pulumi_vault as vault
|
@@ -303,6 +308,8 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
303
308
|
delete_version_after=12600,
|
304
309
|
cas_required=True)
|
305
310
|
```
|
311
|
+
<!--End PulumiCodeChooser -->
|
312
|
+
|
306
313
|
## Required Vault Capabilities
|
307
314
|
|
308
315
|
Use of this resource requires the `create` or `update` capability
|
@@ -312,10 +319,11 @@ class SecretBackendV2(pulumi.CustomResource):
|
|
312
319
|
|
313
320
|
## Import
|
314
321
|
|
315
|
-
The KV-V2 secret backend can be imported using its unique ID,
|
322
|
+
The KV-V2 secret backend can be imported using its unique ID,
|
323
|
+
the `${mount}/config`, e.g.
|
316
324
|
|
317
325
|
```sh
|
318
|
-
|
326
|
+
$ pulumi import vault:kv/secretBackendV2:SecretBackendV2 example kvv2/config
|
319
327
|
```
|
320
328
|
|
321
329
|
:param str resource_name: The name of the resource.
|
pulumi_vault/kv/secret_v2.py
CHANGED
@@ -448,6 +448,7 @@ class SecretV2(pulumi.CustomResource):
|
|
448
448
|
|
449
449
|
## Example Usage
|
450
450
|
|
451
|
+
<!--Start PulumiCodeChooser -->
|
451
452
|
```python
|
452
453
|
import pulumi
|
453
454
|
import json
|
@@ -476,6 +477,8 @@ class SecretV2(pulumi.CustomResource):
|
|
476
477
|
},
|
477
478
|
))
|
478
479
|
```
|
480
|
+
<!--End PulumiCodeChooser -->
|
481
|
+
|
479
482
|
## Required Vault Capabilities
|
480
483
|
|
481
484
|
Use of this resource requires the `create` or `update` capability
|
@@ -500,7 +503,7 @@ class SecretV2(pulumi.CustomResource):
|
|
500
503
|
KV-V2 secrets can be imported using the `path`, e.g.
|
501
504
|
|
502
505
|
```sh
|
503
|
-
|
506
|
+
$ pulumi import vault:kv/secretV2:SecretV2 example kvv2/data/secret
|
504
507
|
```
|
505
508
|
|
506
509
|
:param str resource_name: The name of the resource.
|
@@ -543,6 +546,7 @@ class SecretV2(pulumi.CustomResource):
|
|
543
546
|
|
544
547
|
## Example Usage
|
545
548
|
|
549
|
+
<!--Start PulumiCodeChooser -->
|
546
550
|
```python
|
547
551
|
import pulumi
|
548
552
|
import json
|
@@ -571,6 +575,8 @@ class SecretV2(pulumi.CustomResource):
|
|
571
575
|
},
|
572
576
|
))
|
573
577
|
```
|
578
|
+
<!--End PulumiCodeChooser -->
|
579
|
+
|
574
580
|
## Required Vault Capabilities
|
575
581
|
|
576
582
|
Use of this resource requires the `create` or `update` capability
|
@@ -595,7 +601,7 @@ class SecretV2(pulumi.CustomResource):
|
|
595
601
|
KV-V2 secrets can be imported using the `path`, e.g.
|
596
602
|
|
597
603
|
```sh
|
598
|
-
|
604
|
+
$ pulumi import vault:kv/secretV2:SecretV2 example kvv2/data/secret
|
599
605
|
```
|
600
606
|
|
601
607
|
:param str resource_name: The name of the resource.
|
@@ -1330,6 +1330,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1330
1330
|
|
1331
1331
|
## Example Usage
|
1332
1332
|
|
1333
|
+
<!--Start PulumiCodeChooser -->
|
1333
1334
|
```python
|
1334
1335
|
import pulumi
|
1335
1336
|
import pulumi_vault as vault
|
@@ -1344,13 +1345,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
1344
1345
|
userattr="sAMAccountName",
|
1345
1346
|
userdn="OU=Users,OU=Accounts,DC=example,DC=org")
|
1346
1347
|
```
|
1348
|
+
<!--End PulumiCodeChooser -->
|
1347
1349
|
|
1348
1350
|
## Import
|
1349
1351
|
|
1350
1352
|
LDAP authentication backends can be imported using the `path`, e.g.
|
1351
1353
|
|
1352
1354
|
```sh
|
1353
|
-
|
1355
|
+
$ pulumi import vault:ldap/authBackend:AuthBackend ldap ldap
|
1354
1356
|
```
|
1355
1357
|
|
1356
1358
|
:param str resource_name: The name of the resource.
|
@@ -1420,6 +1422,7 @@ class AuthBackend(pulumi.CustomResource):
|
|
1420
1422
|
|
1421
1423
|
## Example Usage
|
1422
1424
|
|
1425
|
+
<!--Start PulumiCodeChooser -->
|
1423
1426
|
```python
|
1424
1427
|
import pulumi
|
1425
1428
|
import pulumi_vault as vault
|
@@ -1434,13 +1437,14 @@ class AuthBackend(pulumi.CustomResource):
|
|
1434
1437
|
userattr="sAMAccountName",
|
1435
1438
|
userdn="OU=Users,OU=Accounts,DC=example,DC=org")
|
1436
1439
|
```
|
1440
|
+
<!--End PulumiCodeChooser -->
|
1437
1441
|
|
1438
1442
|
## Import
|
1439
1443
|
|
1440
1444
|
LDAP authentication backends can be imported using the `path`, e.g.
|
1441
1445
|
|
1442
1446
|
```sh
|
1443
|
-
|
1447
|
+
$ pulumi import vault:ldap/authBackend:AuthBackend ldap ldap
|
1444
1448
|
```
|
1445
1449
|
|
1446
1450
|
:param str resource_name: The name of the resource.
|
@@ -189,6 +189,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
189
189
|
|
190
190
|
## Example Usage
|
191
191
|
|
192
|
+
<!--Start PulumiCodeChooser -->
|
192
193
|
```python
|
193
194
|
import pulumi
|
194
195
|
import pulumi_vault as vault
|
@@ -207,13 +208,14 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
207
208
|
policies=["dba"],
|
208
209
|
backend=ldap.path)
|
209
210
|
```
|
211
|
+
<!--End PulumiCodeChooser -->
|
210
212
|
|
211
213
|
## Import
|
212
214
|
|
213
215
|
LDAP authentication backend groups can be imported using the `path`, e.g.
|
214
216
|
|
215
217
|
```sh
|
216
|
-
|
218
|
+
$ pulumi import vault:ldap/authBackendGroup:AuthBackendGroup foo auth/ldap/groups/foo
|
217
219
|
```
|
218
220
|
|
219
221
|
:param str resource_name: The name of the resource.
|
@@ -239,6 +241,7 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
239
241
|
|
240
242
|
## Example Usage
|
241
243
|
|
244
|
+
<!--Start PulumiCodeChooser -->
|
242
245
|
```python
|
243
246
|
import pulumi
|
244
247
|
import pulumi_vault as vault
|
@@ -257,13 +260,14 @@ class AuthBackendGroup(pulumi.CustomResource):
|
|
257
260
|
policies=["dba"],
|
258
261
|
backend=ldap.path)
|
259
262
|
```
|
263
|
+
<!--End PulumiCodeChooser -->
|
260
264
|
|
261
265
|
## Import
|
262
266
|
|
263
267
|
LDAP authentication backend groups can be imported using the `path`, e.g.
|
264
268
|
|
265
269
|
```sh
|
266
|
-
|
270
|
+
$ pulumi import vault:ldap/authBackendGroup:AuthBackendGroup foo auth/ldap/groups/foo
|
267
271
|
```
|
268
272
|
|
269
273
|
:param str resource_name: The name of the resource.
|
@@ -222,6 +222,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
222
222
|
|
223
223
|
## Example Usage
|
224
224
|
|
225
|
+
<!--Start PulumiCodeChooser -->
|
225
226
|
```python
|
226
227
|
import pulumi
|
227
228
|
import pulumi_vault as vault
|
@@ -243,13 +244,14 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
243
244
|
],
|
244
245
|
backend=ldap.path)
|
245
246
|
```
|
247
|
+
<!--End PulumiCodeChooser -->
|
246
248
|
|
247
249
|
## Import
|
248
250
|
|
249
251
|
LDAP authentication backend users can be imported using the `path`, e.g.
|
250
252
|
|
251
253
|
```sh
|
252
|
-
|
254
|
+
$ pulumi import vault:ldap/authBackendUser:AuthBackendUser foo auth/ldap/users/foo
|
253
255
|
```
|
254
256
|
|
255
257
|
:param str resource_name: The name of the resource.
|
@@ -276,6 +278,7 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
276
278
|
|
277
279
|
## Example Usage
|
278
280
|
|
281
|
+
<!--Start PulumiCodeChooser -->
|
279
282
|
```python
|
280
283
|
import pulumi
|
281
284
|
import pulumi_vault as vault
|
@@ -297,13 +300,14 @@ class AuthBackendUser(pulumi.CustomResource):
|
|
297
300
|
],
|
298
301
|
backend=ldap.path)
|
299
302
|
```
|
303
|
+
<!--End PulumiCodeChooser -->
|
300
304
|
|
301
305
|
## Import
|
302
306
|
|
303
307
|
LDAP authentication backend users can be imported using the `path`, e.g.
|
304
308
|
|
305
309
|
```sh
|
306
|
-
|
310
|
+
$ pulumi import vault:ldap/authBackendUser:AuthBackendUser foo auth/ldap/users/foo
|
307
311
|
```
|
308
312
|
|
309
313
|
:param str resource_name: The name of the resource.
|